Automation: simplest
Rationalization of procedure: streamline
Bussiness process re: radical design paradigm shift: radical reconceptualization
4.SDLC
PLAN: every system start with the plan
Analysis: work together to gather, understand the document
Design:develop a technical blueprint
Development: the translation of the design into computer code
Test: if the computer code can produce the
Implement: proces of converting
Maintenance: monitor and support the new system
6.website
html caveats:  : insert an extra space or create line breaks self-closing tag xhtml tags should be closed. CSS is a inline,internal, external style bold: look relative links: start with ../- absolute start with. http://
7.privacy: spyware: hidden in free download software adware: software to generate ads. trojan: software you don't want to hidden. clickstream: records of your website. anonymous: hides your identity through the website you visit.
8.harker white hat: no harm, fix computer problems. black hat: get data and quiet about that. script kiddies: can download and break something. exploits: take advantage of vulnerability.
9. intusion detection software: look ppl who should not be there. back up:copy the info. security auditing software: checks out the weakness of your computer.
.encryption: method for scrambling and concealing. Decryption: proces for transforming cipher text to plain text. ciper: transpotation : 1-800-free MSN rail Frence Cipher
UIGETBSRA Reverse DEREU QNOIC WASIE MACI
10. DFS: the use of scientifically derived and proven methods through preservation, collection and validation…. subcatergory: Media analysis: physical media for evidence code analysis: review malicious signature network analysis: scruitinize network ,identify and locate.
Slack space=unused space digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original